— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
We address the goal of making Delegation Logic (DL) into a practically implementable and tractable trustmanagement system. DL [22] is a logic-based knowledge representation (i.e.,...
Service-based systems have many applications, such as collaborative research and development, e-business, health care, military applications, and homeland security. In dynamic ser...
Stephen S. Yau, Haishan Gong, Dazhi Huang, Wei Gao...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...